Professional Documents
Culture Documents
• ESECURITY
1
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Learning Objectives:
3
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
5.1 PERSONAL DATA
4
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
PERSONAL DATA
5
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Examples of personal data;
Bank details
Medical records
Salary
Sex orientation
User name and password
Home address
6
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• How to Improve E- safety/How to be safer online
when using social networking sites
8
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• How to Improve E- safety/How to be safer online
when using social networking sites ( Contd.)
10
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Phishing is when an unauthorized person attempts to
gather personal data, such as passwords, credit card
details, by disguising themselves as a trustworthy person
or organization, through the use of email.
11
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Measures to protect against Phishing
12
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• B. Smishing (SMS Phishing): similar to phishing
but carried out using SMS text messaging
rather than email.
13
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• When that number is telephoned, the person
receiving the call will attempt to get personal
details from the caller. The caller could be charged
a great deal of money for the call.
16
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• The person (scammer ) who is vishing will either
say they are alerting the victim to an issue with
their account, or advising the victim of a
profitable gain. They will often ask the victim
subtle questions to get the personal data they
want.
17
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Measures to protect against Vishing
18
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• D. Pharming: in pharming, a hacker will install
malicious code into a person’s system or
server.
19
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• When a user types in a web address they will be
redirected to a fraudulent, but legitimate
looking, replica website, without their consent.
• The user will continue using the website as they
normally would, unaware of the redirection, and
enter their personal details that will then be
stolen.
20
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Measures to protect against Pharming
21
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
5.2 MALWARE
• Malware is a computer program that is
designed to damage or disrupt a computer
system, and the file that are stored on it.
• Malicious code: code/program that is intended
to harm the computer.
22
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Various forms of Malware
23
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• B. Worms: a small computer program that uses
computer networks and finds security holes to
replicate itself. They can exploit a security hole in
a piece of software or operating system. While
replicating they will often clog up network
bandwidth and can make things run slowly.
24
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• C. Spyware: covers a broad range of malware. The term
refers to any technology used to gather data about a
person without their knowledge. It is most commonly
used to track the movement of people online (internet/
World Wide Web). A common type of spyware is a key
logger.
• A key logger : records key presses from a keyboard and
will allow the person who installed it to gather personal
data about the person.
25
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• D. Adware: Adware is short for advertising-
supported software. It is used to display adverts
that are targeted at the user.
• Adware as malware will present adverts when a
user is browsing the web that is often shown
constantly. They are normally in the form of
popups that cannot be easily closed. They will
mostly just be irritating.
26
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• E. Rootkit: A computer program that enables a
person to gain administrator access to a victim’s
computer. It normally gets installed because a
victim’s password is cracked.
• The person installing the rootkit can then use the
access to stop the computer recognising that the
rootkit is there, so the victim will not know that
someone else has complete access to their
computer system.
27
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• F. A Bot: is an application that is automated and
used to carry out simple and repetitive tasks.
28
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Malicious bots include:
30
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
Consequences of Malware on Organisations and Individuals
31
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
Consequences of Malware on Organisations and Individuals
(Contd.)
36
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
Consequences of Malware on Organisations and Individuals
(Contd.)
40
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
HEALTH ISSUES
41
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by repetitive movements and actions
(continuous and repeated clicking of mouse, or
pressing of keyboard).
This can often be triggered by poor posture.
• Prevention
Avoiding doing the same action without taking
regular breaks and usage of wrist rests can help
prevent RSI , and also a Good posture
42
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• B. Carpal tunnel syndrome: pain, numbness,
tingling sensation in the hands or fingers.
43
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by compression of a major nerve in the
hand that passes over the carpal bones in the
hand. This happens because of repetitive and
continual movements.
• Prevention
Avoiding doing the same action without taking
regular breaks and usage of wrist rests.
44
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• C. Back ache and muscle spasms:
45
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by poor posture and from sitting in the
same position for long periods of time.
• Prevention
Preventive measures include sitting on an
adjustable chair to correct position.
A chair with added back support will also be
helpful. 46
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• D. Eye strain: causes sore eyes, tired eyes or
blurred vision.
47
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by looking at a monitor for long periods
of time.
• Prevention
Regularly looking away from the screen
Sitting at the correct distance
Usage of monitors with eye care protection
settings can help reduce eye strain.
48
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• E. Deep vein thrombosis: when blood clots
occur, usually in a user’s legs.
49
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by sitting in a chair that puts pressure
on the back of a user’s legs, mostly behind the
knees.
• Prevention
Preventive measures include regularly standing
and moving around when using a computer for
long periods of time.
50
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• F. Fatigue: when a user feels very tired and
lethargic. Fatigue can often occur alongside
stress.
51
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Cause(s)
Caused by overworking
• Prevention
Taking regular breaks and working for shorter
periods of time when working can reduce levels
of stress and fatigue.
52
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
SAFETY ISSUES
53
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Prevention
A computer should be used in a ventilated and
fairly cool room.
In case of fire occurring, a CO2 fire extinguisher
should be in any room that has a computer.
Plug sockets should not have too many devices
plugged into them, especially devices that
require a lot of power.
54
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• B. Trailing wires/cables: could cause a safety
concern possibly making people trip over wires.
55
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Prevention
Make sure wires are secured in some way,
such as by cable management system.
Clip all cables together.
56
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• C. Spilt drinks/water: can cause a computer
to short, and food trapped between
keyboards can cause difficulties in using the
computer.
57
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Prevention
Eating and drinking at a computer should be
avoided where possible.
Spill proof keyboards or covers should be
used.
58
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• D. Injury from heavy object: heavy object or
equipment can fall off tables and cause injury.
59
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• Prevention
Ensure sturdy (strongly and solidly built )
desks or tables are used
Place heavy objects or equipment are in the
centre of tables.
60
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• HOME WORK
• QUESTION 1
• In a recent BBC news bulletin it was reported:
• The BBC has obtained exclusive figures from the financial
ombudsman that show there have been nearly 100
complaints about “vishing” in the past three months.
• Describe what is meant by:
• (i) phishing.
• ...............................................................................................
.............................................[3]
• (ii) vishing.
• ...............................................................................................
.............................................[3] 61
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com
• QUESTION 2
• Describe, in detail, three different safety (apart from
e-safety) issues that can arise from the use of IT. For
each issue give one method of helping to prevent it.
Each method must be different.
• Issue 1 ....................................................................
• Prevention ....................................................................
• Issue 2 ......................................................
• Prevention ....................................................................
• Issue 3 ............................................................
• Prevention ............................................ [6]
62
COURSE: A LEVEL IT , CHAPTER 5 ( ESECURITY) , TUTOR: THOMAS ESIZIMETOR, EMAIL: t.esizimetor@oxbridgecollify.com / thomastigbafe@gmail.com